Today's 2-Minute Tech Briefing covers the White House’s push to override state AI laws, renewed uncertainty in enterprise GPU ...
Security features that Apple Inc. added to Leopard look great on paper, but in practice most are half-baked or useless, experts said today. And none of those features, good or bad, will make a whit of ...
How much do cyberattacks cost? Recently, we reported on Clorox suing Cognizant for $380 million over alleged helpdesk failures during a cyberattack. We described how the complaint, filed in a ...
Apple’s platforms may be more secure by design than others, but that doesn’t make them invulnerable to attack. That’s why every user should install the company’s latest security patch — it fixes a ...
The controversial Recall screenshot feature is part of a new Windows build that’s open to Windows Insiders with the right hardware. The Quick Machine Recovery tool is designed to prevent situations ...
New cybersecurity standards proposed by the North American Electric Reliability Corp. (NERC) to protect the nation’s power infrastructure are not broad enough and fail to cover a significant number of ...
With corporate accounting practices under fire, are security practices next? The kindling may already be in the pit. Data security remains largely undefined and unenforced across private industry. The ...
In the movies the government has always got the best toys, the cutting-edge technology and the tightest security standards. Those who have worked on security projects within the government know that ...
Every security system, in the end, depends on people. Ideally, programs could be written with restricted privileges for operators so they would pose no threat – but I doubt it would work in practice.
From spotting weapons and detecting smoke to predicting where incidents are most likely to occur, artificial intelligence is reshaping the future of physical security. In this episode of Today in Tech ...
During the past few weeks, I’ve dedicated a significant amount of time to creating wireless LAN (WLAN) policies and standards. A WLAN site survey I conducted a few weeks ago convinced me to accelerate ...
Security is the new Y2k. Oh, the mapping isn’t exact. With Y2k, there was an immovable deadline and a huge but finite number of problems to fix. With security, there’s no zero hour, and the number of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback